The Illuminati Formula Used to Create an ... - Get a Free Blog
The Illuminati Formula Used to Create an ... - Get a Free Blog
The Illuminati Formula Used to Create an ... - Get a Free Blog
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
was developed by AT&T <strong>an</strong>d uses C l<strong>an</strong>guage. (Bear in mind that there are dialects of<br />
UNIX, such as the st<strong>an</strong>dard AT&T UNIX <strong>an</strong>d for inst<strong>an</strong>ce Berkeley UNIX. <strong>The</strong> UNIX system<br />
uses both timesharing <strong>an</strong>d multitasking.<br />
<strong>The</strong> mind of a Monarch slave also does both multitasking <strong>an</strong>d time sharing. One of the<br />
nice UNIX features, is "protected memory", which is also part of the Monarch<br />
programming. A kernal is what the UNIX programmers call a "protected person". It is<br />
very similar <strong>to</strong> the internal "person" (alter) who helps the Monarch slave’s programming<br />
functions.<br />
<strong>The</strong> big item about UNIX is that it has permissions gr<strong>an</strong>ted. This is similar <strong>to</strong> the Monarch<br />
programming. Permissions are gr<strong>an</strong>ted <strong>to</strong> 3 types of entities. <strong>The</strong> Top Programmer or<br />
"god" as he is called, of the UNIX System receives what is called the individual<br />
permission. <strong>The</strong> next permission is called group permission, <strong>an</strong>d it is given <strong>to</strong> insiders<br />
who work with the system. <strong>The</strong> final permission type is the world, which has very limited<br />
access. <strong>The</strong> parallel between this <strong>an</strong>d the Monarch programming is surprising. In some<br />
cases the programmers may have matched things on a one-<strong>to</strong>-one correspondence.<br />
<strong>The</strong> Monarch program also has a Top Programmer who is called "god" <strong>to</strong> the System. He<br />
has <strong>to</strong>tal control over the system. His programming permissions c<strong>an</strong> not be<br />
deprogrammed out by others who might w<strong>an</strong>t <strong>to</strong> usurp his power.<br />
Hidden from the casual user of the UNIX system are the Daemons <strong>an</strong>d Demons. <strong>The</strong><br />
UNIX programmers decided <strong>to</strong> use the old english spelling for demon = Daemon. <strong>The</strong>se<br />
are computer processes which work secretly behind the scenes <strong>an</strong>d are given actual<br />
demonic names, some corresponding <strong>to</strong> actual names of his<strong>to</strong>rically known demons, such<br />
as Asmodeus. Asmodeus is also a demon which is placed in<strong>to</strong> m<strong>an</strong>y Monarch slaves.<br />
In the UNIX system these demons are treated like persons in the computer’s user<br />
direc<strong>to</strong>r. Demons in the computer system do not have <strong>to</strong> log on<strong>to</strong> the computer, but they<br />
work behind the scenes <strong>an</strong>d are given the same powers that people users are given.<br />
<strong>The</strong>y are set up in the same structure as how the computer treats people. Permission in<br />
the UNIX system is gr<strong>an</strong>ted using <strong>an</strong> 8 bit count with 0 through 7. <strong>The</strong> three kinds of<br />
permission are the read, write, <strong>an</strong>d execute permissions. If no permission were gr<strong>an</strong>ted<br />
in <strong>an</strong>y way the UNIX system would indicate" "on the screen which me<strong>an</strong>s 000000 000 or<br />
nine 0’s.<br />
<strong>The</strong> super user called god is given the code 777 which me<strong>an</strong>s super user. However, the<br />
permission of 666 gives the user the power <strong>to</strong> everything the 777 permission gives,<br />
except that the 777 permission allows the god the master programmer <strong>to</strong> execute not<br />
executable programs.<br />
<strong>The</strong> Postmaster Demon is the head demon, <strong>an</strong>d his permission level in UNIX is 666. (In<br />
the Monarch Programming "Mr. Postm<strong>an</strong>" is a code word used internationally.) <strong>The</strong> most<br />
import<strong>an</strong>t part of the BEAST system is its communication power. <strong>The</strong> Electronic Mail<br />
System of the BEAST allows it <strong>to</strong> communicate worldwide, <strong>an</strong>d along with electronic mail<br />
comes levels of permission <strong>to</strong> super user (god) is called Root.<br />
A programmer on the Beast must get permission. His program must get permission. That<br />
program that gives permission must also get permission. In other words, there are levels<br />
of permission that must be gone through.<br />
This is similar <strong>to</strong> the Monarch program. For inst<strong>an</strong>ce, the alters personalities which would<br />
control the body during <strong>Illuminati</strong> gatherings have very tight access permission. It is very<br />
hard <strong>to</strong> access these hierarchy personalities. Both the UNIX system (<strong>an</strong>d the Monarch<br />
115